
Summary
This detection rule aims to identify potentially malicious activity related to JavaScript files being uploaded or accessed within the S3 static site directory (`static/js/`). Such actions, originating from an IAM user or an assumed role, might suggest unauthorized modifications to web content, often indicating attempts to insert harmful scripts into static websites. It utilizes CloudTrail logs to monitor `PutObject` actions directed at specific bucket paths, thereby determining if these changes are associated with legitimate development processes or potentially nefarious behavior.
The rule employs conditions to filter for relevant IAM users, excludes traffic from common Infrastructure as Code (IaC) tools, and emphasizes the importance of examining the source user and file content for signs of compromise. It suggests investigation steps ranging from user identity verification to analyzing file content for code obfuscation. Additionally, it discusses potential false positives which might arise from normal CI/CD operations or development pipelines, and proposes remediation actions, including code rollback and IAM credential revocation, in the event of confirmed compromises.
Categories
- Cloud
Data Sources
- Cloud Service
- Network Traffic
- Application Log
ATT&CK Techniques
- T1565
- T1565.001
Created: 2025-04-15